Given below are the different phases of the vulnerability management lifecycle. 1. Monitor 2. Vulnerability scan 3. Identify assets and create a baseline 4. Risk assessment 5. Verification 6. Remediation What is the correct sequence of phases involved in the vulnerability management lifecycle?